SlideShare a Scribd company logo
Making Sense of
Critical Security Data
IBM i Security SIEM Integration
Ian Hartley – Product Management Director
Bill Hammond – Product Marketing Director
Housekeeping
Webinar Audio
• Today’s webinar audio is streamed through your computer
speakers
• If you need technical assistance with the web interface or audio,
please reach out to us using the Q&A box
Questions Welcome
• Submit your questions at any time during the presentation using
the Q&A box
Recording and slides
• This webinar is being recorded. You will receive an email following
the webinar with a link to the recording and slides
2
Today’s Agenda
• Basics of security monitoring
• Key areas to monitor
• Integration with SIEM solutions
• How Precisely solutions can help
3
Basics of
Security Monitoring
Enforcement date: January 1, 2020
• Requires organizations to comply with
CCPA if they collect data on residents
of California and have annual revenues
of $25 million, collect information on
over 50,000 people or have 50% of
annual revenue from selling/sharing
personal information
• Gives individuals the right to sue for
damages should a breach expose their
data and that data wasn’t encrypted or
otherwise made unreadable. Key
requirements include:
• Access control
• Restricted user privileges
• Sensitive data protection
• System activity logging
Regulations Require Monitoring
General Data Protection
Regulation
(GDPR)
Enforcement date: 25 May 2018
• Regulation in European Union law on data
protection and privacy for all individuals
within the European Union (EU) and the
European Economic Area (EEA)
• Applies to all organizations doing business
with EU citizens
• Aims primarily to provide protection and
control over their personal data to citizens
and residents, including
• Access control
• Sensitive data protection
• Restricted user privileges
• System activity logging
• Risk assessments
New York Dept. of Financial Services
Cybersecurity Regulation
(NYS 23 NYCRR 500)
Enforcement date: February 15, 2018
• Requires banks, insurance companies,
and other financial services institutions to
establish and maintain a cybersecurity
program designed to protect consumers
• Ensures the safety and soundness of New
York State's financial services industry.
• Requirements protect the confidentiality,
integrity and availability of information
systems, including
• Risk assessments
• Restricted user privileges
• Automatic logouts
• Antivirus
• Multi-factor authentication
• System activity logging
California Consumer
Protection Act
(CCPA)
5
Why we do log
collection and
monitoring?
Active
Monitoring
Catching the cybercriminals early
Forensics
Fixing the problem after a
security breach
6
Active Monitoring
Stop a Data Breach Before it Happens.
• Over 3,800 breaches in 2019
• 50% increase over last 5 years
• Billions of records every year
• Less than 1% of the breaches were
discovered through log analysis
• 69% of these breaches were detectible via
log evidence
Take Away: If you are monitoring
your logs, you can detect a breach
and stop it before data is lost.
7
Forensics
How did it happen, how do I clean it up?
• What servers are infected?
• How many are infected?
• Where did it start?
• How does the malware actually work?
• How do I clean it up?
Take Away: If you do not have logs you can’t
answer these questions and you are almost
certain to become re-infected with malware
8
Key Areas to
Monitor
Security Monitoring
You can’t monitor what you aren’t watching!
10
A strong IBM i security foundation requires solutions that draw a
perimeter around your system and its data – capturing security
data that you can monitor in log files
IBM i has powerful audit logs
• System Journal – QAUDJRN
• Database (Application) Journals – for Before and After
Images
• Other IBM Journals are available
• QHST Log Files – DSPLOG Command
• System Message Queues – QSYSOPR, QSYSMSG
Turn on auditing, save journal receivers, and take advantage of
everything the operating system can log for you
The State of Logging on
the IBM i
The state of logging on most IBM i’s is not good
• There is a ton of valuable information stored on your IBM i
• The IBM i logs are in proprietary format
• IBM i security logs are often an enclave inside the IT
organization
• No standardized syslog communications facility
• The essence of good security is externalizing the logs
• There is a requirement to remove the risk of tampering
• Compliance regulations recognize the need to watch all users
– including the most powerful users
11
Analyze IBM i Audit Logs
Tools help you extract insight from your logs
12
IBM i log files are comprehensive, unalterable, and
trusted by auditors BUT they are not easy to analyze.
Monitoring and reporting tools are needed to:
• Simplify the process of analyzing complex IBM i journals
• Filter through the massive amount of information in your logs
• Detect security incidents and raise alerts
• Quickly highlight compliance deviations
• Deliver reports in multiple formats to compliance and security
auditors, partners, customers and your management team
• Relieve your team of the burden of manual analysis
System Log Collection and
Monitoring
Core Principles
• Centralize log collection from ALL servers, devices and PCs
• Real time collection
• Event correlation for pattern recognition
• Real time monitoring and alerting
• Historical archives for forensics
• Query and reporting services
13
Enterprise-Level Visibility
Monitor IBM i security all the other platforms in your enterprise
14
Monitoring and reporting tools can forward IBM i security data to
a Security Information and Event Management (SIEM) solution to:
• Integrate IBM i security data with data from other IT platforms
• Enable advanced analysis of security data using advanced SIEM
technology for correlation, pattern matching, and threat detection
• Support information sharing and collaboration across teams
• Facilitate integration with case management and ticketing systems
Integration with
Security Information
and Event Management
(SIEM) solutions
What is SIEM?
Security Information and Event
Management
• Real-time analysis of security alerts
generated by applications and network
hardware
• Holistic, unified view into infrastructure,
workflow, policy compliance and log
management
• Monitor and manage user and service
privileges as well as external threat data
Log Collection
Log Analysis
Event Correlation
Log Forensics
IT Compliance
Application Log Monitoring
Object Access Auditing
Real-Time Alerting
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
System/Device Log Monitoring
Log Retention
SIEM
16
Enterprise Security Monitoring
• Monitoring and reporting tools can forward IBM i security
data to a Security Information and Event Management (SIEM)
solution to:
• Integrate IBM i security data with data from other IT
platforms
• Enable advanced analysis of security data using correlation,
pattern matching, and threat detection
• Sharing information across teams
• Integrate with case management and ticketing systems
Monitor IBM i security along with your other enterprise platforms
17
What Can Your SIEM Show You?
• Data movement – inbound/outbound FTP
• Dataset access operations
• Determine potential security threats based on unauthorized access
attempts
• Ensure only authorized users are accessing critical datasets
• Privileged/non-privileged user activity monitoring
• Unusual behavior pattern – off hours connections
• High number of invalid logon attempts
• Attack detection – intrusion, scans, floods
• Authentication anomalies – e.g. entered the building at 08:30 but
logged on from another country at 09:00
• Network Traffic Analysis – high data volumes from a device/server
• … and much more
18
What Can I Learn?
Examples that your SIEM solution can help identify
19
• File accesses outside business hours
• Accesses to sensitive database fields
• Changes of more than 10% to a credit limit field
• All accesses from a specific IP address
• Command line activity for powerful users (*ALLOBJ, *SECADM)
• Changes to system values, user profiles, and authorization lists
• Attempts to sign into a specific account
• Actions on a sensitive spool file, such as display or deletion of the
payroll spool file
Security is important – what about examples?
• Authorization Failures
• Login attempts
• Creating or deleting objects
• User profile events –
special authorities
• System Value changes
• Changes to sensitive files
20
Using Message Queue or History Data
• High-light critical events
• Look at trends, for example application errors
• Proactive analysis
• Long running jobs
• Hardware errors
• Application issues
21
Examples of application file monitoring
• Changes made to files
• Matching before/after field
changes
• Anomalies in file field changes
• Powerful search capability to
match and note exceptions.
index=eview72 JournalName="TESTJRN" ObjectName="PAYROLL"
(EntryType=UP OR EntryType=UB)
| rename SALARY AS "Salary"
| transaction EMPNUM maxspan=30s startswith=(EntryType=UB)
endswith=(EntryType=UP)
| eval befsalary=mvindex(Salary, 0)
| eval aftsalary=mvindex(Salary, 1)
| eval pctchange = round((aftsalary/befsalary*100)-100,0)
| where pctchange > $changepct$
22
SIEM Dashboards
23
How Precisely
Can Help
24
Precisely SIEM Integration
Ironstream
• Integrate mainframe and IBM i
security data into leading IT
analytics and operations
platforms for an enterprise-
wide view of your security
Assure Security
• Extract insights from IBM i
journal data send data directly
to your enterprise SIEM solution
allowing IBM i security to be
monitored with all other
enterprise platforms.
HPE ArcSight
Splunk
LogRhythm
MacAfee
AlienVault
SolarWinds
Etc…
25
Q & A
IBM i Security SIEM Integration

More Related Content

PPTX
Essential Layers of IBM i Security: File and Field Security
PPTX
Essential Layers of IBM i Security: Security Monitoring and Auditing
PDF
Monitoring and Reporting on IBM i Compliance and Security
PPTX
IBM i Security: Identifying the Events That Matter Most
PPTX
Chapter 5 - Identity Management
PDF
Protecting Your Business from Unauthorized IBM i Access
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PPTX
Chapter 1 Law & Ethics
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: Security Monitoring and Auditing
Monitoring and Reporting on IBM i Compliance and Security
IBM i Security: Identifying the Events That Matter Most
Chapter 5 - Identity Management
Protecting Your Business from Unauthorized IBM i Access
CNIT 160 Ch 4c: Security Program Development (Part 3)
Chapter 1 Law & Ethics

What's hot (20)

PDF
CNIT 160 Ch 4 Information Security Program Development (Part 3)
PDF
CNIT 160 4d Security Program Management (Part 4)
PDF
6. Security Assessment and Testing
PDF
Flash Friday: Data Quality & GDPR
PPTX
Compliance technical controls and you rva sec 2019
PDF
CNIT 160 4d Security Program Management (Part 4)
PPTX
Essential Layers of IBM i Security: System-Access Security
PDF
Security 101: Controlling Access to IBM i Systems and Data
PDF
Taking the Pulse of IBM i Security for 2020
PPTX
Log maintenance network securiy
PDF
CNIT 160 4e Security Program Management (Part 5)
PDF
3. Security Engineering
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
Introducing Assure Security Risk Assessment
PDF
CNIT 125 7. Security Assessment and Testing
PDF
Security 101: Controlling Access to IBM i Systems and Data
PDF
PCI Compliance White Paper
PDF
The New Assure Security: Complete IBM i Compliance and Security
PPTX
CISSP - Chapter 3 - Physical security
PPTX
Chapter 3 security part i auditing operating systems and networks
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 4d Security Program Management (Part 4)
6. Security Assessment and Testing
Flash Friday: Data Quality & GDPR
Compliance technical controls and you rva sec 2019
CNIT 160 4d Security Program Management (Part 4)
Essential Layers of IBM i Security: System-Access Security
Security 101: Controlling Access to IBM i Systems and Data
Taking the Pulse of IBM i Security for 2020
Log maintenance network securiy
CNIT 160 4e Security Program Management (Part 5)
3. Security Engineering
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Introducing Assure Security Risk Assessment
CNIT 125 7. Security Assessment and Testing
Security 101: Controlling Access to IBM i Systems and Data
PCI Compliance White Paper
The New Assure Security: Complete IBM i Compliance and Security
CISSP - Chapter 3 - Physical security
Chapter 3 security part i auditing operating systems and networks
Ad

Similar to IBM i Security SIEM Integration (20)

PPTX
Effective Security Monitoring for IBM i: What You Need to Know
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
Lock it Down: Access Control for IBM i
PPTX
SIEM - Your Complete IT Security Arsenal
PDF
PDF
Cyber security series administrative control breaches
PDF
SIEM enabled risk management , SOC and GRC v1.0
PPT
Meletis BelsisManaging and enforcing information security
PDF
Accelerating Regulatory Compliance for IBM i Systems
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PDF
Revealing the 2016 State of IBM i Security
PPTX
IBM i HA and Security: Why They Need to Work Together
PDF
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
PPTX
Decrypting the security mystery with SIEM (Part 1) ​
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
PDF
More Databases. More Hackers. More Audits.
PPTX
Tips on SIEM Ops 2015
PPTX
The Best Shield Against Ransomware for IBM i
PDF
Cybersecurity Series SEIM Log Analysis
PPTX
IBM Messaging Security - Why securing your environment is important : IBM Int...
Effective Security Monitoring for IBM i: What You Need to Know
Improve IT Security and Compliance with Mainframe Data in Splunk
Lock it Down: Access Control for IBM i
SIEM - Your Complete IT Security Arsenal
Cyber security series administrative control breaches
SIEM enabled risk management , SOC and GRC v1.0
Meletis BelsisManaging and enforcing information security
Accelerating Regulatory Compliance for IBM i Systems
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Revealing the 2016 State of IBM i Security
IBM i HA and Security: Why They Need to Work Together
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Decrypting the security mystery with SIEM (Part 1) ​
UNIT -III SIEM aur baato kaise hai aap log.pdf
More Databases. More Hackers. More Audits.
Tips on SIEM Ops 2015
The Best Shield Against Ransomware for IBM i
Cybersecurity Series SEIM Log Analysis
IBM Messaging Security - Why securing your environment is important : IBM Int...
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
Understanding_Digital_Forensics_Presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

IBM i Security SIEM Integration

  • 1. Making Sense of Critical Security Data IBM i Security SIEM Integration Ian Hartley – Product Management Director Bill Hammond – Product Marketing Director
  • 2. Housekeeping Webinar Audio • Today’s webinar audio is streamed through your computer speakers • If you need technical assistance with the web interface or audio, please reach out to us using the Q&A box Questions Welcome • Submit your questions at any time during the presentation using the Q&A box Recording and slides • This webinar is being recorded. You will receive an email following the webinar with a link to the recording and slides 2
  • 3. Today’s Agenda • Basics of security monitoring • Key areas to monitor • Integration with SIEM solutions • How Precisely solutions can help 3
  • 5. Enforcement date: January 1, 2020 • Requires organizations to comply with CCPA if they collect data on residents of California and have annual revenues of $25 million, collect information on over 50,000 people or have 50% of annual revenue from selling/sharing personal information • Gives individuals the right to sue for damages should a breach expose their data and that data wasn’t encrypted or otherwise made unreadable. Key requirements include: • Access control • Restricted user privileges • Sensitive data protection • System activity logging Regulations Require Monitoring General Data Protection Regulation (GDPR) Enforcement date: 25 May 2018 • Regulation in European Union law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA) • Applies to all organizations doing business with EU citizens • Aims primarily to provide protection and control over their personal data to citizens and residents, including • Access control • Sensitive data protection • Restricted user privileges • System activity logging • Risk assessments New York Dept. of Financial Services Cybersecurity Regulation (NYS 23 NYCRR 500) Enforcement date: February 15, 2018 • Requires banks, insurance companies, and other financial services institutions to establish and maintain a cybersecurity program designed to protect consumers • Ensures the safety and soundness of New York State's financial services industry. • Requirements protect the confidentiality, integrity and availability of information systems, including • Risk assessments • Restricted user privileges • Automatic logouts • Antivirus • Multi-factor authentication • System activity logging California Consumer Protection Act (CCPA) 5
  • 6. Why we do log collection and monitoring? Active Monitoring Catching the cybercriminals early Forensics Fixing the problem after a security breach 6
  • 7. Active Monitoring Stop a Data Breach Before it Happens. • Over 3,800 breaches in 2019 • 50% increase over last 5 years • Billions of records every year • Less than 1% of the breaches were discovered through log analysis • 69% of these breaches were detectible via log evidence Take Away: If you are monitoring your logs, you can detect a breach and stop it before data is lost. 7
  • 8. Forensics How did it happen, how do I clean it up? • What servers are infected? • How many are infected? • Where did it start? • How does the malware actually work? • How do I clean it up? Take Away: If you do not have logs you can’t answer these questions and you are almost certain to become re-infected with malware 8
  • 10. Security Monitoring You can’t monitor what you aren’t watching! 10 A strong IBM i security foundation requires solutions that draw a perimeter around your system and its data – capturing security data that you can monitor in log files IBM i has powerful audit logs • System Journal – QAUDJRN • Database (Application) Journals – for Before and After Images • Other IBM Journals are available • QHST Log Files – DSPLOG Command • System Message Queues – QSYSOPR, QSYSMSG Turn on auditing, save journal receivers, and take advantage of everything the operating system can log for you
  • 11. The State of Logging on the IBM i The state of logging on most IBM i’s is not good • There is a ton of valuable information stored on your IBM i • The IBM i logs are in proprietary format • IBM i security logs are often an enclave inside the IT organization • No standardized syslog communications facility • The essence of good security is externalizing the logs • There is a requirement to remove the risk of tampering • Compliance regulations recognize the need to watch all users – including the most powerful users 11
  • 12. Analyze IBM i Audit Logs Tools help you extract insight from your logs 12 IBM i log files are comprehensive, unalterable, and trusted by auditors BUT they are not easy to analyze. Monitoring and reporting tools are needed to: • Simplify the process of analyzing complex IBM i journals • Filter through the massive amount of information in your logs • Detect security incidents and raise alerts • Quickly highlight compliance deviations • Deliver reports in multiple formats to compliance and security auditors, partners, customers and your management team • Relieve your team of the burden of manual analysis
  • 13. System Log Collection and Monitoring Core Principles • Centralize log collection from ALL servers, devices and PCs • Real time collection • Event correlation for pattern recognition • Real time monitoring and alerting • Historical archives for forensics • Query and reporting services 13
  • 14. Enterprise-Level Visibility Monitor IBM i security all the other platforms in your enterprise 14 Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using advanced SIEM technology for correlation, pattern matching, and threat detection • Support information sharing and collaboration across teams • Facilitate integration with case management and ticketing systems
  • 15. Integration with Security Information and Event Management (SIEM) solutions
  • 16. What is SIEM? Security Information and Event Management • Real-time analysis of security alerts generated by applications and network hardware • Holistic, unified view into infrastructure, workflow, policy compliance and log management • Monitor and manage user and service privileges as well as external threat data Log Collection Log Analysis Event Correlation Log Forensics IT Compliance Application Log Monitoring Object Access Auditing Real-Time Alerting User Activity Monitoring Dashboards Reporting File Integrity Monitoring System/Device Log Monitoring Log Retention SIEM 16
  • 17. Enterprise Security Monitoring • Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using correlation, pattern matching, and threat detection • Sharing information across teams • Integrate with case management and ticketing systems Monitor IBM i security along with your other enterprise platforms 17
  • 18. What Can Your SIEM Show You? • Data movement – inbound/outbound FTP • Dataset access operations • Determine potential security threats based on unauthorized access attempts • Ensure only authorized users are accessing critical datasets • Privileged/non-privileged user activity monitoring • Unusual behavior pattern – off hours connections • High number of invalid logon attempts • Attack detection – intrusion, scans, floods • Authentication anomalies – e.g. entered the building at 08:30 but logged on from another country at 09:00 • Network Traffic Analysis – high data volumes from a device/server • … and much more 18
  • 19. What Can I Learn? Examples that your SIEM solution can help identify 19 • File accesses outside business hours • Accesses to sensitive database fields • Changes of more than 10% to a credit limit field • All accesses from a specific IP address • Command line activity for powerful users (*ALLOBJ, *SECADM) • Changes to system values, user profiles, and authorization lists • Attempts to sign into a specific account • Actions on a sensitive spool file, such as display or deletion of the payroll spool file
  • 20. Security is important – what about examples? • Authorization Failures • Login attempts • Creating or deleting objects • User profile events – special authorities • System Value changes • Changes to sensitive files 20
  • 21. Using Message Queue or History Data • High-light critical events • Look at trends, for example application errors • Proactive analysis • Long running jobs • Hardware errors • Application issues 21
  • 22. Examples of application file monitoring • Changes made to files • Matching before/after field changes • Anomalies in file field changes • Powerful search capability to match and note exceptions. index=eview72 JournalName="TESTJRN" ObjectName="PAYROLL" (EntryType=UP OR EntryType=UB) | rename SALARY AS "Salary" | transaction EMPNUM maxspan=30s startswith=(EntryType=UB) endswith=(EntryType=UP) | eval befsalary=mvindex(Salary, 0) | eval aftsalary=mvindex(Salary, 1) | eval pctchange = round((aftsalary/befsalary*100)-100,0) | where pctchange > $changepct$ 22
  • 25. Precisely SIEM Integration Ironstream • Integrate mainframe and IBM i security data into leading IT analytics and operations platforms for an enterprise- wide view of your security Assure Security • Extract insights from IBM i journal data send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. HPE ArcSight Splunk LogRhythm MacAfee AlienVault SolarWinds Etc… 25
  • 26. Q & A

Editor's Notes

  • #4: Bill
  • #6: Bill GDPR – Not only for Europe, It also addresses the export of personal data outside the EU (European Union) and EEA (European Economic Area) areas. 23 NYCRR 500 - Cybersecurity Requirements for Financial Services Companies requires banks, insurance companies, and other financial services institutions regulated by the New York Department of Financial Services.
  • #7: Patrick
  • #8: Patrick
  • #9: Patrick
  • #11: Bill
  • #12: Patrick
  • #13: Bill
  • #14: Patrick
  • #16: Bill will transition to Ian for this section Thanks Bill…so let’s now look at SIEM solutions…what they are…integrating data into them…and why you would want to do that.
  • #17: This is just a general … what is a SIEM solution slide SIEM technology aggregates and provides real-time analysis of security alerts using event data produced by security devices, network infrastructure components, systems, and applications. A primary function of SIEM is to analyze security event data in real-time for internal and external threat detection to prevent potential hacks and data loss. This typically includes user behavior analytics (UBA) – understanding user behavior and how it might impact security. SIEM technologies also collect, store, analyze and report on data needed for regulatory compliance to ensure that audit requirements are met as dictated. SIEM stands for “Security Information and Event Management”…and it’s a software solution that gathers security-related information, events and activities into one place so that the they can be analyzed. Data fed into a SIEM can come from many different software and hardware sources…and wherever possible the information is gathered in real-time. Let’s face it…in the context of security…a lot can happen in a short period of time…so you need to know what is happening…and where…as soon as possible…not 2 minutes after the data or system has been compromised. A SIEM solution gives you the visibility across your infrastructure so you can ensure activities are in line with organizational policies…data regulations…and expected information management actions. And this applies to both internal and external activities…that is activities taking place within your own community of employees…as well as threats coming from outside your organization.
  • #18: Makes the point that you need to include your IBM i data alongside all the other platforms in order to have a complete and accurate picture of your security situation One of the key aspects of any SIEM solution is to get information from across the entire enterprise. So, this means every source…including IBMi. You need to see information side-by-side with data from other areas of your IT infrastructure and user community…and this means bringing together elements from a diverse set of sources. Once you have this information all in one place…it needs to be examined as a whole…treated as a mass of information that works together to paint the picture of your security posture. SIEM solutions carry out detailed analysis and correlations with this data…looking for anomalies…behavior patterns…outliers…indicators that can point to something you need to be aware of…whether that is something very obvious or something subtle…such as a behavior pattern spread over time. By using a SIEM you are putting things like log data to work. The SIEM will process this information and identify notable items that you and the Security team may need pay attention to. To help with this it is also possible to integrate case management and incident ticketing workflows to ensure those that need to know are aware as soon as possible.
  • #19: Examples of SIEM data A SIEM can categorize data into many different categories…each with their own security implications. Looking at data…perhaps your most valuable and critical information…you need to be aware of where that information is going. Do you allow FTP? Should it be secured? Is data going to an unusual endpoint? Is someone accessing or attempting to access protected data? And every organization has users with privileged authority…and perhaps their system access should be watched even more closely. They have access to critical system elements and should be trusted, but… And if your system happens to be connected to the outside world…then you may also need to more aware of external attacks…from intrusion detection to port scanning or even things like denial of service. General system authentications and access should be routinely monitored with a SIEM. For example, someone swipes into the building at 8 30…but is then their account connects from another location at 9 am. Could be perfectly normal for your organization but may be highly suspicious activity. And a privileged user connecting at 3 am on a Sunday…may be something that is suspicious. Even the volumes of network traffic across your infrastructure can be an indicator of something unusual and should be investigated. There are many scenarios that a SIEM can capture…either out-of-the-box or that are specific to how your organization operates. What is normal for one…is not necessarily the case for another….but a SIEM needs to be able to cater for these needs.
  • #20: What I can learn from using a SIEM solution A SIEM can distill data to a point where you have sufficient information to decide whether something is suspicious or perfectly normal. For example…is it OK that someone is accessing data outside regular business hours? It could be…but then again…circumstances will determine what…is or is not…OK. Who…what…where…when…how…are all questions that need to be factored into making a decision about what needs further action. Should that user account be issuing that specific command on your production LPAR? Someone just got some extra account privileges…is this acceptable? Multiple logon attempts for the same user have been observed over the last 6 hours…is this suspicious? Activities around sensitive information…perhaps specific and unique to your organization…need to be monitored. These types of actions, scenarios and activities can be detected…and a SIEM can help determine whether this is normal…or needs immediate attention. But the list of items you should be monitoring…is long…
  • #21: The next 3 slides are just specific IBM i examples of data that can be sent to SIEM solutions Some of the sources of information needed by a SIEM solution can be pretty unfriendly. Often this is log or machine data that may not be so usable in its native format. But within this data can lie very useful elements of information…such as the items listed here… Authorizations Login attempts Actions around objects and user profiles Or system settings and your sensitive data
  • #22: And then looking specifically at the IBMi there are specific queues…logs…and journals…that need to be examined for… Certain events Trends Patterns …and even examining how jobs are running…perhaps running at abnormal times or running too long… Even spotting hardware errors and application issues can be indicative of a situation that needs attention.
  • #23: And your data also needs to be monitored. Who is accessing what, when and why? What changes are being made and are they legitimate? You need something like a SIEM solution combined with powerful search and analysis to be able to get to grips with what is happening with your data and spot those anomalies that can point to an issue. Security comes from a combination of many factors – both internal and external…and many things can influence what you need to pay attention to and look for.
  • #24: Comment on how we can even populate dashboards in products like Splunk with security data Fortunately…with the right tools…it is easy to get log…machine…and application data from your IBMi into something like Splunk. Here…you can search, analyze and correlate this information in many ways to reveal insights like the ones we have already spoken about. This data can be visualized on standard dashboards or even wired into Splunk’s award-winning Enterprise Security SIEM solution where out-of-the-box correlations and security workflow can help you ensure you have a good surveillance of your infrastructure. With that…I’ll have back to Bill…
  • #25: Ian will transition back to Bill to cover this section
  • #26: Precisely has multiple solutions and the one that’s right for you will depend on your requirements, your SIEM solution choice and other factors. Talk to you Precisely account rep to learn more